I see latest version of apache tomcat v 6.0.44 released. This is great
news.


Thanks and Regards
-------------------------------
Raghavendra Neelekani


On 6 May 2015 at 18:16, Christopher Schultz <ch...@christopherschultz.net>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Raghavendra,
>
> On 5/6/15 2:19 AM, Raghavendra Nilekani wrote:
> > Thanks for the information. This is useful. I feel I should take
> > the latest available version and upgrade. Once the new version
> > (6.0.44) with fix is available, I can upgrade once again.
>
> You should really make plans to upgrade to the Tomcat 8.0.x series
> sooner rather than later.
>
> > Can I know the tentative data (month) during which we get the
> > official release of the version 6.0.44 ?
>
> It is likely to be in the next 5-10 days, but we can't make any promises
> .
>
> - -chris
>
> > On 5 May 2015 at 17:15, André Warnier <a...@ice-sa.com> wrote:
> >
> >> Raghavendra Nilekani wrote:
> >>
> >>> Hi
> >>>
> >>> I have an application where I currently use 6.0.20 version of
> >>> Apache tomcat bundle from spring source. Now because of
> >>> security vulnerabilities I have to migrate to newer latest
> >>> version of Apache tomcat. I saw the latest version on Apace
> >>> tomcat site is Apache Tomcat 6.0.43 where the highest CVE fixed
> >>> is *CVE-2014-0227. *
> >>>
> >>> Now one more latest CVE *Apache Tomcat File Upload denial of
> >>> service *has come. The fix for this problem is not officially
> >>> released by Apache. I see applying a patch is able to eliminate
> >>> this problem. The bugfix is ready for download at
> >>> svn.apache.org. The vulnerability is also documented in the
> >>> databases at X-Force (102131) and SecurityTracker (ID
> >>> 1032079).
> >>>
> >>> From seclists.org, I heard this problem was identified as a
> >>> partial DoS
> >>>>
> >>> (non persistent, but you can very easily eat up all server ram)
> >>> and assigned CVE-2014-0230 and then the person handling it left
> >>> Red Hat and it didn't get processed properly.
> >>>
> >>> Can you please tell me, is there any official fix for this
> >>> problem available and from where I can download the official
> >>> fix for this CVE ? When will Apache tomcat site have a newer
> >>> version of Apache tomcat with this CVE fixed ?
> >>>
> >>>
> >> Hi. I believe that you should first read this :
> >> http://tomcat.apache.org/security.html at least the first
> >> section, to get a general idea.
> >>
> >> Do not forget that Tomcat is an open-source, free software, that
> >> the people developing it and maintaining it do this on a
> >> voluntary base, and that their time is limited. Other
> >> organisations set it as their task to provide their own versions
> >> of Tomcat packages, and to guarantee that they are "patched" to
> >> the latest known security vulnerabilities. And they (rightly)
> >> charge a fee for that work.
> >>
> >> That does not mean that the developers of Apache Tomcat do not
> >> take security vulnerabilities seriously, and do not do their best
> >> to fix them as quickly as possible. But it does mean that there
> >> is not necessarily always a released version of Tomcat available
> >> on the official website, with patches for the latest
> >> vulnerabilities.
> >>
> >> So, probably the best you can do is : 1) look in the page above
> >> (Lists of security problems fixed in released versions of Apache
> >> Tomcat are available:) for your version of Tomcat, and uprade to
> >> a version indicated there if appropriate 2) otherwise, make
> >> pressure on your Tomcat package provider (whom you presumably pay
> >> for that), to provide the patch you need
> >>
> >>
> >>
> >> ---------------------------------------------------------------------
> >>
> >>
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> >> For additional commands, e-mail: users-h...@tomcat.apache.org
> >>
> >>
> >
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
> Comment: GPGTools - http://gpgtools.org
>
> iQIcBAEBCAAGBQJVSg0+AAoJEBzwKT+lPKRYwIsP/iJC8N+UvRD7Gto80qz77R+O
> oEiCxBuf3l4XKC7OGWMh+wkzDjEZIuFgNeEY3uqUFfOtDs0eKYDeqpBNvCB2Cayi
> UwGIHa0xTWZ2Fn05SIv/b7g6bgHZ+qSCBxLWq4bcLEeWXwOZNmEBUruLL7RiwszQ
> m+MHZMxCDAXLs7+P2R/4pQlPCyy6QDspHLhcHXhWBHMK9BuqQuJfwtnVdpVUKJtu
> SUAhYB3VE+iBlL6a9onCR1FoV+sTlw2ZkQB2EVe22OhrkpKDPDzgtiMl19Z7Q2lN
> tZo9t/COIHTCtwUE2jkg7Zc7YhcsZgULIsdMrDsy71nlPoz0shD/Sa15UEb7IrC8
> K7lIHBtzPCn/SXNSG2a7kqxXKVBNdWj9Wkv9+gcAaEgg682c10y4ATc9koAyBMya
> +QsXJkpcumt5MRr9rBFJE86+/bewOIODQ/xLILETFKPLYqqZiW+0mISSa6P+ePeP
> XGF9Z2hyEHZ08EC+vl8kAKLGsQYuRNvUhADuqhBwCknBrKdP55gQPU2+OP0x2uU8
> mB7n85ZlhZqTGNrAlsyCU/9MYo2vkyOOgr/MfCksM6EJpUzrF4jgGbK7eNLPKIyj
> jaFSbcSPJEBHGzJc97sfkqwO4MjMVngkxP3nTxZ8Q19rQnWkZ0AMDfqMKo/hICAt
> Qec5dQmz5a0wLtx3tlhd
> =ysTD
> -----END PGP SIGNATURE-----
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to